General
-
Target
na.elf
-
Size
70KB
-
Sample
241010-hnm3aswbrn
-
MD5
0bbfac65b706281404dc418e548e552a
-
SHA1
a951aeda826d01cf2571f4ec2b1992cce76edc27
-
SHA256
4fda35ed2d413b0d54f5f25b8bf9df56756ffc000eab4fcf7fc1894638f681db
-
SHA512
a87eb0bca11548af7a211cf1d660ad48e3f3717cbb3659b171305626476e62e663d88daed30a0c56ccc381caa271aecfe3dbb4755b93ffd4a7a27537db0e2884
-
SSDEEP
1536:+VjRvmd7qol1juyRDhC23Q/tnkqV3Zs43NVY:+/ed7qoldj0tnkqV39Y
Static task
static1
Behavioral task
behavioral1
Sample
na.elf
Resource
debian9-mipsel-20240729-en
Malware Config
Targets
-
-
Target
na.elf
-
Size
70KB
-
MD5
0bbfac65b706281404dc418e548e552a
-
SHA1
a951aeda826d01cf2571f4ec2b1992cce76edc27
-
SHA256
4fda35ed2d413b0d54f5f25b8bf9df56756ffc000eab4fcf7fc1894638f681db
-
SHA512
a87eb0bca11548af7a211cf1d660ad48e3f3717cbb3659b171305626476e62e663d88daed30a0c56ccc381caa271aecfe3dbb4755b93ffd4a7a27537db0e2884
-
SSDEEP
1536:+VjRvmd7qol1juyRDhC23Q/tnkqV3Zs43NVY:+/ed7qoldj0tnkqV39Y
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-